Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 04:15

General

  • Target

    54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe

  • Size

    548KB

  • MD5

    07f350fc82c902bc86a47b26cd3fbff0

  • SHA1

    0a67832785a42fbc4daa2facaeab85999619e8aa

  • SHA256

    54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f

  • SHA512

    8f0d0f9176b456b916545463d62d6e65f4559a1152adec6fca2d65d25ccef31c011ab30056fed27b3e6b1de71729b6cafd0abcd9c335300ae734549db621645f

  • SSDEEP

    12288:X0bun/W34ZZJ1cjCT3bgO16bYzdUTOokFSH/UjwjWOXsSMc0cacy+:X0bbvjiJ1n5loxUNSMc0Z

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe
    "C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe
      "C:\Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe" -launcher
      2⤵
      • Executes dropped EXE
      PID:1940
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe--.docx"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\54d31c46d09b5848bf31f25fe60be61955b513ae74e3f88b847afb757e29d62f.exe--.docx

    Filesize

    296KB

    MD5

    252fb563a316229eb0cff9bc58b48c79

    SHA1

    2150f4903481cb3e7ead0d655ad477dd2d0dd53b

    SHA256

    2480d3f7583da57538eab32b3e2c9f155d7d2bb05662af48caab2405a43dd8ff

    SHA512

    37a219648635216dd1e25c668e00c3d323454872510d037df87aa6c3acc0fca50efa969a21118185cef366887031ca3fcc6f34c3bdd2b00ecb89e6341611198c

  • C:\Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe

    Filesize

    227KB

    MD5

    2a6e093535f97571ad659d6639dfd51f

    SHA1

    23a661afa9db77e9c9051ba83633f4082f591f10

    SHA256

    42e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3

    SHA512

    740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6

  • C:\Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe

    Filesize

    227KB

    MD5

    2a6e093535f97571ad659d6639dfd51f

    SHA1

    23a661afa9db77e9c9051ba83633f4082f591f10

    SHA256

    42e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3

    SHA512

    740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6

  • \Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe

    Filesize

    227KB

    MD5

    2a6e093535f97571ad659d6639dfd51f

    SHA1

    23a661afa9db77e9c9051ba83633f4082f591f10

    SHA256

    42e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3

    SHA512

    740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6

  • \Users\Admin\AppData\Roaming\JNUVD7\2X8HVZ.exe

    Filesize

    227KB

    MD5

    2a6e093535f97571ad659d6639dfd51f

    SHA1

    23a661afa9db77e9c9051ba83633f4082f591f10

    SHA256

    42e54dcb4ac266a981138fa70a61051b033b493050440d8c387d05c0a76d6cb3

    SHA512

    740a0f7d50c121baeed391615d46a4c996344c0d360ceaee65eaa1c3c87a20d977ad2732d9f89cd78229dcb21f49b2ee2fd10ee35161b59651ec625e622545d6

  • memory/1824-56-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1824-55-0x0000000000310000-0x0000000000337000-memory.dmp

    Filesize

    156KB

  • memory/1824-54-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/1824-72-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1824-71-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1940-63-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1940-62-0x0000000000280000-0x00000000002A7000-memory.dmp

    Filesize

    156KB

  • memory/1940-73-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1960-65-0x00000000720B1000-0x00000000720B4000-memory.dmp

    Filesize

    12KB

  • memory/1960-66-0x000000006FB31000-0x000000006FB33000-memory.dmp

    Filesize

    8KB

  • memory/1960-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1960-69-0x0000000070B1D000-0x0000000070B28000-memory.dmp

    Filesize

    44KB

  • memory/1960-74-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1960-75-0x0000000070B1D000-0x0000000070B28000-memory.dmp

    Filesize

    44KB